Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
metric
biblio
Identifying Security Requirements for Smart Grid Components: A Smart Grid Security Metric
Submitted by grigby1 on Fri, 01/13/2023 - 4:20pm
critical infrastructure
risk management
security
pubcrawl
Metrics
Smart Grids
Measurement
Security Metrics
power systems
risk assessment
Costs
metric
Securitisation Need
security level
SGAM
biblio
Data-Driven Insights from Vulnerability Discovery Metrics
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
natural language feedback
vulnerability discovery metrics
Vulnerability
threshold
software metrics
security of data
Security Metrics
pubcrawl
Programming Language
I-O Systems
metric
interpretation
data-driven insights
Chromium project
application domain
security
i-o systems security
biblio
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
network security
vulnerable server
time 19.0 month
statistical analysis
SSH honeypot-based system
software reliability
software quality
Security Metrics
security
pubcrawl
network security metric classification
attacker behaviour evaluation
Metrics
metric
Kippo
information collection
IDS
honeypot
file servers
Data collection
Conferences
computer network security
biblio
A scalable and flexible DDoS mitigation system using network function virtualization
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
scalable dispatcher
IP networks
legitimate traffic
metric
network function virtualization
Network Function Virtualization architecture
online websites
pubcrawl
Resiliency
Scalability
scalable DDoS mitigation system
Human behavior
Scalable routing
Servers
SYN flood attack
target server
telecommunication traffic
third-party cloud-based DDoS
threat mitigation
virtual network agents
virtualisation
distributed denial of service
attack traffic
batching forwarding
bucket-based forwarding mechanism
Cloud Computing
Computer crime
computer network security
DDoS defense framework
DDoS defense solutions
ddos mitigation
Dispatching
agent addition
distributed denial of service attacks
dropping rate
enterprise networks
excessive traffic delay
firewall
firewalls
flexible DDoS mitigation system
flexible dispatcher
highly flexible solutions
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
road safety
threat mitigation
metric
pubcrawl
Human behavior
Resiliency
traffic engineering computing
technological development
technical mitigation measures
Technical mitigation
security of data
Safety
road vehicles
automobiles
organizational mitigation measures
Organizational Mitigation
increased risks
cybersecurity threats
cyberattack
cyber threats
cyber threat mitigation
autonomous vehicles
automotive vehicle cybersecurity
automotive industry
Automotive engineering
biblio
Mitigating IoT Insecurity with Inoculation Epidemics
Submitted by aekwall on Wed, 02/13/2019 - 11:56am
botnet
epidemic
Human behavior
inoculation
IoT
metric
pubcrawl
Resiliency
threat mitigation
botnets
biblio
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
Internal Threat
IoT
LLN
OF
Rank Attack Manipulation
RPL
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Knowledge-enriched Security and Privacy Threat Modeling
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
design
model enrichment
security
Threat Modeling
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Threat Intelligence Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
computing methodology
Intrusion Detection
threat hunting
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
1
2
next ›
last »